Pre-Summer Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 2
Total 12 questions
Exam Code: FCP_FSA_AD-5.0                Update: May 5, 2026
Exam Name: FCP - FortiSandbox 5.0 Administrator

Fortinet FCP - FortiSandbox 5.0 Administrator FCP_FSA_AD-5.0 Exam Dumps: Updated Questions & Answers (May 2026)

Question # 1

Refer to the exhibit.

A network topology is shown. Which two important steps must you take before you enable a BCC adapter on FortiSandbox? (Choose two answers)

A.

Configure the upstream SEG to extract files and URLs from emails and send them to FortiSandbox for analysis.

B.

Configure an A record on the DNS server for the FortiSandbox IP.

C.

Configure the sub-domain on the upstream SEG to BCC emails to FortiSandbox.

D.

Add an MX record on the DNS server for the BCC email sub-domain to resolve to the FortiSandbox IP.

Question # 2

Refer to the exhibit.

As a best practice, where must you rank the FortiClient inputs when configuring the job queue priority on FortiSandbox? (Choose one answer)

A.

Before FortiGate but after FortiMail inputs

B.

After all other input methods

C.

After On-Demand but before FortiGate inputs

D.

Before all other input methods

Question # 3

Refer to the exhibit.

Which two statements about the scanned file are true? (Choose two answers)

A.

The advanced AI feature identified the threat.

B.

The URL was identified as a known malicious URL.

C.

The analysis resulted are defined.

D.

The analysis resulted in a malicious verdict.

Question # 4

Refer to the exhibit.

Which command must you use to configure the FortiSandbox device as the primary node? (Choose one answer)

A.

hc-settings -si iport1 -a10.25.1.30

B.

hc-settings -si iport1 -a10.25.1.40

C.

hc-settings -si iport1 -a10.25.1.254

D.

hc-settings -si iport1 -a10.25.1.50

Question # 5

You are asked to create an 802.3ad interface on FortiSandbox with port 2 and port 4. However, when attempting to make the configuration change, you discover that you cannot select port 4 for the aggregate bonding. What are two reasons for this issue? (Choose two answers)

A.

Port 4 is an administration interface.

B.

Port 4 does not have an IP address.

C.

Port 4 is an api interface.

D.

Port 4 is a sniffer interface.

Question # 6

A FortiGate root VDOM is authorized on FortiSandbox, and FortiGate is configured to send suspicious files to FortiSandbox for inspection. You create a new VDOM and then generates some traffic so that the new VDOM sends a file to FortiSandbox for the first time. In this scenario, which action will FortiSandbox take? (Choose one answer)

A.

FortiSandbox will inspect all files, based on the root VDOM authorization state and configuration.

B.

FortiSandbox will accept the file, but not inspect the file until the administrator manually authorizes the new VDOM on FortiSandbox.

C.

FortiSandbox will authorize the new VDOM by default and inspect files as they are received.

D.

FortiSandbox will accept the file; but not inspect the file until the administrator manually configures the new VDOM on FortiSandbox.

Question # 7

A FortiSandbox VM has been deployed and has been functioning correctly for several months. Suddenly, the system begins rejecting file submissions with an error message indicating a licensing problem. How can you determine, using the CLI, if the license is still valid? (Choose one answer)

A.

vm-status

B.

hc-setting -1

C.

vm-license -1

D.

status

Question # 8

You are asked to configure FortiSandbox to use one VM instance for multiple sequential scan jobs without shutting down the instance between each scan job submission. Which scan profile setting must you enable to achieve this? (Choose one answer)

A.

Adaptive VM scan

B.

VM scan ratio

C.

Parallel VM scan

D.

Pipeline mode

Question # 9

Which two products integrated with FortiSandbox work to protect against the lateral movement stage of the Cyber Kill Chain? (Choose two answers)

A.

FortiMail

B.

FortiDeceptor

C.

FortiADC

D.

FortiGate

Question # 10

Refer to the exhibit.

Which command must you use to configure the secondary node? (Choose one answer)

A.

hc-worker -a -s10.25.1.30 -p < password >

B.

hc-worker -a -s10.50.1.30 -p < password >

C.

hc-worker -a -s10.50.1.40 -p < password >

D.

hc-worker -a -s10.25.1.50 -p < password >

Page: 1 / 2
Total 12 questions

Most Popular Certification Exams

Payment

       

Contact us

Site Secure

mcafee secure

TESTED 05 May 2026